github.com/theishshah/operator-sdk@v0.6.0/pkg/scaffold/role_test.go (about)

     1  // Copyright 2018 The Operator-SDK Authors
     2  //
     3  // Licensed under the Apache License, Version 2.0 (the "License");
     4  // you may not use this file except in compliance with the License.
     5  // You may obtain a copy of the License at
     6  //
     7  //     http://www.apache.org/licenses/LICENSE-2.0
     8  //
     9  // Unless required by applicable law or agreed to in writing, software
    10  // distributed under the License is distributed on an "AS IS" BASIS,
    11  // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    12  // See the License for the specific language governing permissions and
    13  // limitations under the License.
    14  
    15  package scaffold
    16  
    17  import (
    18  	"testing"
    19  
    20  	"github.com/operator-framework/operator-sdk/internal/util/diffutil"
    21  )
    22  
    23  func TestRole(t *testing.T) {
    24  	s, buf := setupScaffoldAndWriter()
    25  	err := s.Execute(appConfig, &Role{})
    26  	if err != nil {
    27  		t.Fatalf("Failed to execute the scaffold: (%v)", err)
    28  	}
    29  
    30  	if roleExp != buf.String() {
    31  		diffs := diffutil.Diff(roleExp, buf.String())
    32  		t.Fatalf("Expected vs actual differs.\n%v", diffs)
    33  	}
    34  }
    35  
    36  func TestRoleClusterScoped(t *testing.T) {
    37  	s, buf := setupScaffoldAndWriter()
    38  	err := s.Execute(appConfig, &Role{IsClusterScoped: true})
    39  	if err != nil {
    40  		t.Fatalf("Failed to execute the scaffold: (%v)", err)
    41  	}
    42  
    43  	if clusterroleExp != buf.String() {
    44  		diffs := diffutil.Diff(clusterroleExp, buf.String())
    45  		t.Fatalf("Expected vs actual differs.\n%v", diffs)
    46  	}
    47  }
    48  
    49  const roleExp = `kind: Role
    50  apiVersion: rbac.authorization.k8s.io/v1
    51  metadata:
    52    name: app-operator
    53  rules:
    54  - apiGroups:
    55    - ""
    56    resources:
    57    - pods
    58    - services
    59    - endpoints
    60    - persistentvolumeclaims
    61    - events
    62    - configmaps
    63    - secrets
    64    verbs:
    65    - "*"
    66  - apiGroups:
    67    - ""
    68    resources:
    69    - namespaces
    70    verbs:
    71    - get
    72  - apiGroups:
    73    - apps
    74    resources:
    75    - deployments
    76    - daemonsets
    77    - replicasets
    78    - statefulsets
    79    verbs:
    80    - "*"
    81  - apiGroups:
    82    - monitoring.coreos.com
    83    resources:
    84    - servicemonitors
    85    verbs:
    86    - "get"
    87    - "create"
    88  - apiGroups:
    89    - apps
    90    resources:
    91    - deployments/finalizers
    92    resourceNames:
    93    - app-operator
    94    verbs:
    95    - "update"
    96  `
    97  
    98  const clusterroleExp = `kind: ClusterRole
    99  apiVersion: rbac.authorization.k8s.io/v1
   100  metadata:
   101    name: app-operator
   102  rules:
   103  - apiGroups:
   104    - ""
   105    resources:
   106    - pods
   107    - services
   108    - endpoints
   109    - persistentvolumeclaims
   110    - events
   111    - configmaps
   112    - secrets
   113    verbs:
   114    - "*"
   115  - apiGroups:
   116    - ""
   117    resources:
   118    - namespaces
   119    verbs:
   120    - get
   121  - apiGroups:
   122    - apps
   123    resources:
   124    - deployments
   125    - daemonsets
   126    - replicasets
   127    - statefulsets
   128    verbs:
   129    - "*"
   130  - apiGroups:
   131    - monitoring.coreos.com
   132    resources:
   133    - servicemonitors
   134    verbs:
   135    - "get"
   136    - "create"
   137  - apiGroups:
   138    - apps
   139    resources:
   140    - deployments/finalizers
   141    resourceNames:
   142    - app-operator
   143    verbs:
   144    - "update"
   145  `